<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Panic — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/panic/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 20:11:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/panic/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dasel Selector Lexer Index-Out-of-Range Panic on Trailing Backslash (CVE-2026-46377)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dasel-panic/</link><pubDate>Tue, 19 May 2026 20:11:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dasel-panic/</guid><description>The dasel selector lexer is vulnerable to an index-out-of-range panic when tokenizing a quoted string that ends with a trailing backslash (e.g., `"\` or `'\`), leading to a process crash if an attacker can control the selector string.</description><content:encoded><![CDATA[<p>The <code>dasel</code> library, a command-line tool and Go library for selecting and updating data structures, is vulnerable to a denial-of-service attack. Specifically, the selector lexer component within <code>dasel</code> panics when processing a quoted string that ends with a trailing backslash. This occurs due to a missing bounds check in the escape sequence handler, leading to an index-out-of-range error when the lexer attempts to read past the end of the input string. Confirmed on versions <code>v3.0.0</code> and <code>v3.3.1</code>, this vulnerability can be triggered with a minimal 2-byte input (<code>&quot;\</code> or <code>'\</code>). An attacker who can control the selector/query string passed to dasel can trigger a Go runtime panic, crashing the process unless the caller explicitly recovers from panics.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious input string containing a quoted string that ends with a trailing backslash (e.g., <code>&quot;\</code> or <code>'\</code>).</li>
<li>The attacker provides this malicious input string to an application that uses the <code>dasel</code> library.</li>
<li>The application passes the input string to the <code>lexer.NewTokenizer</code> function to create a new tokenizer.</li>
<li>The <code>Tokenize</code> method is called on the tokenizer to lex the input string.</li>
<li>The <code>parseCurRune</code> function is called to parse the current rune.</li>
<li>Inside <code>parseCurRune</code>, the code detects the backslash character but does not check if it&rsquo;s the last character in the input.</li>
<li>The <code>pos++</code> increments the position beyond the end of the input.</li>
<li>The subsequent <code>p.src[pos]</code> attempts to read past the end of the input slice, triggering a Go runtime panic and crashing the <code>dasel</code> process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition. Any application using <code>dasel</code> that processes attacker-controlled selector strings is susceptible to crashing. This can impact web applications using <code>dasel</code> for dynamic querying, applications that construct selectors from user input, and shared tooling environments where selectors are passed as parameters. The severity is high because a minimal input can cause an immediate process crash.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of <code>dasel</code> that includes the fix for CVE-2026-46377 once available.</li>
<li>Implement input validation and sanitization on selector strings to prevent malicious inputs containing trailing backslashes in quoted strings, mitigating the risk even without a patch.</li>
<li>Monitor application logs for panic errors originating from the <code>dasel/selector/lexer</code> package to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule <code>Detect Dasel Trailing Backslash Panic (CVE-2026-46377)</code> to identify processes that may be crashing due to this vulnerability by detecting the &ldquo;index out of range&rdquo; error message.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>panic</category><category>go</category><category>dasel</category></item></channel></rss>